Description of the security update for the .NET Framework 4.5.2 for Windows Server 2012: April 11, 2017

Note

Known issues in this security update

After you apply this security update, the PowerShell v3.0+ stop-computer command fails. You get a "Privilege not held" error message. For more information, go to the following article in the Microsoft Knowledge Base:

Summary

This update resolves a vulnerability in the Microsoft .NET Framework that could allow remote code execution when the .NET Framework fails to properly validate input before loading libraries. An attacker who successfully exploits this vulnerability could take control of an affected system. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2017-0160.

Important

If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Additional information about this security update

For any Windows Management Instrumentation (WMI) applications returning the following error message:

Get-WmiObject: The method or operation is not implemented.

To temporarily disable this update, customers can apply the following registry entry to their system.